What is 'safe harbour' the EU Declared Invalid?

The European Court of Justice has ruled that the “safe harbour” agreement that allowed the transfer of European citizens data to the US is no longer valid. But what does that mean for the Facebooks, Googles and Microsofts of this world?

In a two-year-old case forced to the EU’s highest court by Austrian privacy campaigner Max Schrems, the EUCJ ruled that the European Commission’s trans-Atlantic data protection agreement that went into force in 2000 was invalid because it does not adequately protect consumers in the wake of the Snowden revelations.

What was the ‘safe harbour’ agreement?

EU privacy law forbids the movement of its citizens’ data outside of the EU, unless it is transferred to a location, which is deemed to have “adequate” privacy protections in line with those of the EU. The safe harbour agreement that was made between the EC and the US government essentially promised to protect EU citizens’ data if transferred by American companies to the US.It allowed companies such as Facebook to self-certify that they would protect EU citizens’ data when transferred and stored within US data centres. Patrick Van Eecke, co-head of the global privacy practice DLA Piper said: “The advantage of safe harbour was that it functioned as a kind of ‘one stop shop’ allowing for the export of personal data to the US, whoever in Europe it came from, without the need to ask for consent, or to enter into bilateral agreements, over and over again.”

Can data still be transferred to the US?

Now that the 2000 agreement has been called invalid, American companies – including Google, Facebook, Apple and Microsoft – can no longer rely on self-certification and must seek to strike “model contract clauses” in each case. These agreements authorise the transfer of data outside of Europe. Monique Goyens, director general of the European Consumer Organisation said: “In essence, if Facebook, Google et al. wish to continue sending Europeans’ personal data over the Atlantic they will just have to guarantee an adequate level of protection in line with EU rules.”
The impact on large US technology companies and their operations within the EU is likely to be limited to a large amount of paperwork. Many will already have model contract clauses already drawn up. Others may be forced to stop the transfer of data to the US until they have.
Many US companies have established or are in the process of building EU-based data centres to handle data for EU citizens, including Facebook, Apple and Google. The search company, for instance, lists four data centres within Europe, including one in Ireland.

What about Facebook?

For Facebook, which has been placed at the centre of this case by Schrems, the decision means that the Irish data protection authority (DPA) will be forced to investigate the Austrian’s claims and Facebook’s data protection practices.
“[The Irish DPA must]decide whether ... transfer of the data of Facebook’s European subscribers to the US should be suspended on the grounds that that country does not afford an adequate level of protection of personal data,” the EUCJ said.

Will I notice anything different?

The impact on users in the short term is unlikely to be obvious. The dissolution of the agreement will, in theory, ensure better data protection for users’ personal information going forward. It may also help stop the US government from being able to gain access to user data from the EU.
Sites and services such as Facebook are highly unlikely to be disrupted to any meaningful level. But it may open the door to further probes, complaints and lawsuits from users and data regulators.

What about cloud services?

The companies most affected are likely to be smaller, less financially and technologically able companies. Many use US-based cloud services to store or process data that they could not do themselves. It is the 21st century equivalent of outsourcing. Those companies will have to abide by the same systems as Facebook and Google, agreeing model contract clauses and ensuring that the service they are using, such as Amazon’s web services, also complies with data protection regulations. Despite being standard and essentially fixed agreements, getting them approved before transferring data will be both a financial and administrative burden.

Will a new safe harbour agreement be needed?

The ruling did not come completely out of the blue – it’s a ratification of the EU’s Advocate General’s opinion on Safe Harbour – but was not expected quite so soon. A new safe harbour agreement is currently being negotiated between the EU and US, and has been in negotiation for the last two years, following the Snowden revelations. The EU has been trying to limit the US government’s access to EU citizens’ data stored in the US and to allow EU citizens to sue US companies in US courts should they misuse their data. The EU has been using the threat of vetoing future trade agreements as a stick, but an agreement has yet to be struck. The new ruling is likely to light a fire under the proceedings as a new agreement is needed to help lubricate international trade in services.Some analysts see the EUCJ’s ruling as likely to hurt, not help, the new safe harbour negotiations. Van Eecke: “By tweaking and fine-tuning the existing safe harbour system and adding a layer of solid enforcement we could come to a workable solution. This is exactly what the government officials are working on, but which now risks to be impeded by the court’s decision.”

What happens if one can’t be made?

Should the US attempt to derail a new safe harbour agreement, it is US companies aiming to expand beyond US borders that are likely to be impacted. European companies may also see access to advanced cloud services restricted, although the move to data centres situated in Europe will ease the situation. In the meantime encryption may hold the answer to maintaining data transfer while a new agreement is put in place. Nigel Hawthorn, from cloud security company Skyhigh Networks, said: “Organisations need to investigate technologies such as encryption or risk being dragged through the courts by privacy advocates, customers or employees. Tokenising or encrypting data flows before they are sent to the cloud, and keeping the keys on premise, means all of these issues disappear. There is no ‘personal’ data in the cloud service once it has been encrypted or tokenised.”

Guardian

 

« Bitcoin - It's Uncomplicated
White House Backs Off Encryption »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

National Association of Software and Services Companies (NASSCOM)

National Association of Software and Services Companies (NASSCOM)

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

PartnerRe

PartnerRe

PartnerRe Ltd. provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.